Documente Academic
Documente Profesional
Documente Cultură
UPS Network
Management Card 2
AP9630, AP9631
本マニュアル<各国の言語に対応する>はウェブサイト (www.apc.com) からダウン
ロードできます。
This manual is available in English on the Web site (www.apc.com).
Dieses Handbuch ist in Deutsch auf der Webseite (www.apc.com) verfügbar.
Este manual está disponible en español en la página web (www.apc.com).
Ce manuel est disponible en français sur le site internet (www.apc.com).
Questo manuale è disponibile in italiano sul sito web (www.apc.com).
Este manual está disponível em português no site (www.apc.com).
Данное руководство на русском языке доступно на сайте (www.apc.com )
在公司的网站上 (www.apc.com) 有本手册的中文版。
웹싸이트 (www.apc.com) 에 한국어 매뉴얼 있습니다 .
The two American Power Conversion UPS Network Management Cards (NMC) mentioned
below are Web-based, IPv6 Ready products that manage supported devices using multiple
open standards such as:
The AP9631 Network Management Card includes all AP9630 Network Management Card features and the
following:
• Provides two USB ports
• Supports two universal input/ output ports, to which you can connect:
– Temperature (AP9335T) or temperature/humidity sensors (AP9335TH)
– Relay input/output connectors that support two input contacts and one output relay (using
AP9810 Dry Contact I/O Accessory)
To configure the TCP/IP settings, see the Network Management Card Installation Manual,
available on the Network Management Card Utility CD and in printed form.
For detailed information on how to use a DHCP server to configure the TCP/IP settings at an NMC,
see “TCP/IP and Communication Settings” on page 54.
8. Type quit or exit to log off, reconnect any serial cable you disconnected, and restart any service you
disabled.
Features
Item Description
Features
Item Description
LED Descriptions
Status LED
This LED indicates the status of the NMC.
Condition Description
One of the following situations exists:
• The NMC is not receiving input power.
Off
• The NMC is not operating properly. It may need to be repaired or replaced. Contact
Customer Support. See “APC Worldwide Customer Support” on page 89.
Solid green The NMC has valid TCP/IP settings.
A hardware failure has been detected in the NMC. Contact Customer Support. See
Solid orange
“APC Worldwide Customer Support” on page 89.
Flashing green The NMC does not have valid TCP/IP settings.1
Flashing orange The NMC is making BOOTP requests.1
Alternately flashing If the LED is flashing slowly, the NMC is making DHCP2 requests.1
green and orange If the LED is flashing rapidly, the NMC is starting up.
1. If you do not use a BOOTP or DHCP server, see the Network Management Card Installation Manual provided in
printed format and on the Network Management Card Utility CD in PDF to configure the TCP/IP settings of the
NMC.
2. To use a DHCP server, see “TCP/IP and Communication Settings” on page 54.
Condition Description
One or more of the following situations exist:
• The NMC is not receiving input power.
Off • The cable that connects the NMC to the network is disconnected or defective.
• The device that connects the NMC to the network is turned off or not operating
correctly.
• The NMC itself is not operating properly. It may need to be repaired or replaced.
Off (continued)
Contact Customer Support. See “APC Worldwide Customer Support” on page 89.
Solid green The NMC is connected to a network operating at 10 Megabits per second (Mbps).
Solid orange The NMC is connected to a network operating at 100 Mbps.
Watchdog Features
Overview
To detect internal problems and recover from unanticipated inputs, the Management Card uses internal,
system-wide watchdog mechanisms. When it restarts to recover from an internal problem, a System: Network
Interface restarted event is recorded in the event log.
Main Screen
Sample main screen
Following is an example of the screen displayed when you log on to the command line interface at the Network
Management Card (NMC).
APC>
If P+ is not displayed, contact Customer Support. See “APC Worldwide Customer Support” on page 89.
Command syntax
Item Description
- Options are preceded by a hyphen.
Definitions of options are enclosed in angle brackets. For example:
<>
-dp <device password>
If a command accepts multiple options or an option accepts mutually exclusive
[]
arguments, the values may be enclosed in brackets.
A vertical line between items enclosed in brackets or angle brackets indicates that
|
the items are mutually exclusive. You must use one of the items.
In this example, the user command accepts the option -an, which defines the Administrator user name, and
the option -ap, which defines the Administrator password. To change the Administrator user name and
password to XYZ:
1. Type the user command, one option, and the argument XYZ:
user -ap XYZ
2. After the first command succeeds, type the user command, the second option, and the argument XYZ:
user -an XYZ
A command that accepts mutually exclusive arguments for an option:
alarmcount -p [all | warning | critical]
In this example, the option -p accepts only three arguments: all, warning, or critical. For example, to
view the number of active critical alarms, type:
alarmcount -p critical
The command will fail if you type an argument that is not specified.
?
Access: Administrator, Device User
Description: View a list of all the CLI commands available to your account type. To view help text for a
specific command, type the command followed by a question mark.
Example: To view a list of options that are accepted by the alarmcount command, type:
alarmcount ?
about
Access: Administrator, Device User
Description: View hardware and firmware information. This information is useful in troubleshooting and
enables you to determine if updated firmware is available at the website.
alarmcount
Access: Administrator, Device User
Description:
boot
Access: Administrator only
Description: Define how the NMC will obtain its network settings, including the IP address, subnet mask,
and default gateway. Then configure the BOOTP or DHCP server settings.
cd
Access: Administrator, Device User
Description: Navigate to a folder in the directory structure of the NMC.
Example 1: To change to the ssh folder and confirm that an SSH security certificate was uploaded to the
NMC:
1. Type cd ssh and press ENTER.
2. Type dir and press ENTER to list the files stored in the SSH folder.
Example 2: To return to the main directory folder, type:
cd ..
cfgshutdn
Access: Administrator only, Device User
Description: Configure the shutdown parameters: this enables you to show and configure UPS Shutdown
Delay, UPS Return Delay, UPS Low Battery Duration, UPS Sleep Time, and UPS Min Return Runtime.
These options are not available with all UPS devices.
cfgpower
Access: Administrator only, Device User
console
Access: Administrator only
Description: Define whether users can access the command line interface using Telnet, which is enabled by
default, or Secure SHell (SSH), which provides protection by transmitting user names, passwords, and data in
encrypted form. You can change the Telnet or SSH port setting for additional security. Alternately, disable
network access to the command line interface.
date
Access: Administrator only
Definition: Configure the date used by the NMC.
delete
Access: Administrator only
Description: Delete a file in the file system. (To delete the event log, see “eventlog,” beginning on page ).
Argument Description
<file name> Type the name of the file to delete.
detstatus
Access: Administrator, Device User
Description: View the detailed status of the UPS. See also the -st option in “ups” on page 23.
dir
Access: Administrator, Device User
Description: View the files and folders stored on the NMC.
dns
Access: Administrator
Description: Configure the manual Domain Name System (DNS) settings.
eventlog
Access: Administrator, Device User
Description: View the date and time you retrieved the event log, the status of the UPS, and the status of
sensors connected to the NMC. View the most recent device events, and the date and time they occurred. Use
the following keys to navigate the event log:
Key Description
ESC Close the event log and return to the command line interface.
Update the log display. Use this command to view events that were recorded after you last
ENTER
retrieved and displayed the log.
exit
Access: Administrator, Device User
Description: Exit from the command line interface session.
format
Access: Administrator only
Description: Reformat the file system of the NMC and erase all security certificates, encryption keys,
configuration settings, and the event and data logs. Be careful with this command.
To reset the NMC to its default configuration, use the resetToDef command.
ftp
Access: Administrator only
Description: Enable or disable access to the FTP server. Optionally, change the port setting to the number
of any unused port from 5001 to 32768 for added security.
help
Access: Administrator, Device User
Description: View a list of all the CLI commands available to your account type. To view help text for a
specific command, type the command followed by help.
Example 1: To view a list of commands available to someone logged on as a Device User, type:
help
Example 2: To view a list of options that are accepted by the alarmcount command, type:
alarmcount help
netstat
Access: Administrator, Device User
ntp
Access: Administrator, Device User
Description: View and configure the network time protocol parameters.
ping
Access: Administrator, Device User
Description. Determine whether the device with the IP address or DNS name you specify is connected to
the network. Four inquiries are sent to the address.
Argument Description
Type an IP address with the format xxx.xxx.xxx.xxx, or the DNS name configured
<IP address or DNS name>
by the DNS server.
Example: To determine whether a device with an IP address of 150.250.6.10 is connected to the network,
type:
ping 150.250.6.10
portspeed
Access: Administrator
Description:
Option Arguments Description
Define the communication speed of the Ethernet port. The auto command
auto | 10H | 10F | enables the Ethernet devices to negotiate to transmit at the highest possible
-s
100H | 100F speed. See “Port Speed” on page 55 for more information about the port speed
settings.
Example: To configure the TCP/IP port to communicate using 100 Mbps with half-duplex communication
(communication in only one direction at a time), type:
portspeed -s 100H
prompt
Access: Administrator, Device User
Example: To include the account type of the currently logged-in user in the command prompt, type:
prompt -s long
quit
Access: Administrator, Device User
Description: Exit from the command line interface session (this works the same as the exit command).
radius
Access: Administrator only
Description: View the existing RADIUS settings, enable or disable RADIUS authentication, and configure
basic authentication parameters for up to two RADIUS servers.
For a summary of RADIUS server configuration and a list of supported RADIUS servers, see
“Configuring the RADIUS Server” on page 52.
Additional authentication parameters for RADIUS servers are available at the user interface of the
NMC. See “RADIUS” on page 52 for more information.
For detailed information about configuring your RADIUS server, see the Security Handbook,
available on the Network Management Card Utility CD and at the website, www.apc.com.
Example 1:
To view the existing RADIUS settings for the NMC, type radius and press ENTER.
reboot
Access: Administrator
Description: Restart the interface of the NMC.
resetToDef
Access: Administrator only
Description: Reset all parameters to their default.
Example: To reset all of the configuration changes except the TCP/IP settings for the NMC, type:
resetToDef -p keepip
snmp, snmpv3
Access: Administrator only
Description: Enable or disable SNMP 1 or SNMP 3.
system
Access: Administrator only
Description: View and set the system name, the contact, the location and view up time as well as the date
and time, the logged-on user, and the high-level system status P, N, A (see “Main screen status fields”).
tcpip
Access: Administrator only
Description: View and manually configure these network settings for the NMC:
Example 1: To view the network settings of the NMC, type tcpip and press ENTER.
Example 2: To manually configure an IP address of 150.250.6.10 for the NMC, type:
tcpip -i 150.250.6.10
tcpip6
Access: Administrator only
Description: Enable IPv6 and view and manually configure these network settings for the NMC (NMC):
Example 1: To view the network settings of the NMC, type tcpip6 and press ENTER.
Example 2: To manually configure an IPv6 address of 2001:0:0:0:0:FFD3:0:57ab for the NMC, type:
tcpip -i 2001:0:0:0:0:FFD3:0:57ab
uio
Access: Administrator, Device User
Example 2: To view the status of the devices connected to a Dry Contact I/O Accessory that is installed in universal
input/ output port 2, type:
uio -st 2
ups
Some ups options are dependant on the UPS model. Not all configurations may support all options
of the ups command.
|
These commands are only available on the MGE Galaxy 300 and MGE Galaxy 7000 UPS. Some
options may only be available based on the individual UPS model.
upsfwupdate
user
Access: Administrator only
Description: Configure the user name and password for each account type, and configure the inactivity
timeout.
For information on the permissions granted to each account type (Administrator, Device User, and
Read-Only User), see “Types of user accounts” on page 3.
web
Access: Administrator
Description: Enable access to the user interface using HTTP or HTTPS.
For additional security, you can change the port setting for HTTP and HTTPS to any unused port from 5000 –
32768. Users must then use a colon (:) in the address field of the browser to specify the port number. For
example, for a port number of 5000 and an IP address of 152.214.12.114:
http://152.214.12.114:5000
xferStatus
Access: Administrator only
Description: View the result of the last file transfer.
See “Verifying Upgrades” on page 80 for descriptions of the transfer result codes.
How to Log On
Overview
You can use the DNS name or the System IP address of the NMC for the URL address of the user interface. Use
your case-sensitive user name and password to log on. The default user name differs by account type:
• apc for Administrator
• device for a Device User
• readonly for a Read-Only User
The default password is apc for all three account types.
You can set your user interface language as you log on by choosing a language from the Language drop-down
box. See “Adding and Changing Language Packs” on page 80.
When HTTPS is enabled, the NMC generates its own certificate. This certificate negotiates
encryption methods with your browser. Refer to the Security Guide on the CD or on the
www.apc.com website for more details.
HTTPS https://Web1
HTTPS https://139.225.6.133
HTTPS http://139.225.6.133:5000
On the Home page of the interface, you can view active alarm conditions and the most recent events recorded
in the event log.
Symbol Description
Warning: An alarm condition requires attention and could jeopardize your data or equipment
if its cause is not addressed.
No Alarms: No alarms are present, and the UPS and NMC are operating normally.
At the upper right corner of every page, the same icons report the UPS Status. If any Critical or Warning
alarms exist, the number of active alarms also displays.
To return to the Home page click on one of the quick status icon on any page of the interface.
Each tab (except the tab for the Home page) has a left navigation menu, consisting of headings and options.
At the lower left on each page of the interface, there are three configurable links. By default, the links access
the URLs for these Web pages:
• Link 1: the Knowledge Base page of the www.apc.com website
• Link 2: the Product Information page of the www.apc.com website
• Link 3: the downloads page of the www.apc.com website
Overview Page
Path: UPS > Overview
The Overview page is displayed by default when you click the UPS tab.
Operating state
Below the UPS model name and configured UPS name, icons and accompanying text indicate the operating
status of the UPS. See “Quick status icons” on page 30 for a description of the icons.
Quick Status
This shows you the UPS load, battery charge, voltage, and other useful information.
To view detailed information about status items specific to the UPS model associated with the
NMC, see the online help.
measurements option
The reason for the last battery transfer, the UPS temperature, and the runtime remaining always display. The
types of model-specific information displayed include voltage, load, redundant power, battery, and internal and
external components.
To view detailed information about status items specific to the UPS model associated with the
NMC, see the online help.
Control page
To perform actions to control the functioning of a UPS, select UPS or outlet groups under Control.
Path: UPS > Control
UPS option
This option applies both to individual UPS models and to Synchronized Control Groups. For background
information on Synchronized Control Groups, see “The sync control option” on page 41
Actions (for a single UPS and Synchronized Control Groups). Use the actions described in the
following table for single UPS models and for Synchronized Control Groups.
Follow these guidelines:
• The actions Put UPS in Bypass and Take UPS Off Bypass are supported:
– Only for single UPS models, NOT for Synchronized Control Groups
– Only for Symmetra UPS and some Smart-UPS models
• All other actions are supported:
– For Smart-UPS models, including those in Synchronized Control Groups
– For single UPS models, including single Symmetra models
Action Definition
Turns on power at the UPS.
Turn UPS On (user
interface) • For a UPS model with Switched Outlet groups, this action then turns on the outlet groups
according to the value for Power On Delay for each group. See “The outlet groups option
ups -c On (including automatic load-shedding)” on page 37.
(command line
interface) • For a Synchronized Control Group, after a delay of a few seconds, the action turns on all
enabled group members that have input power.
Turns off the output power of the UPS and (for Switched Outlet groups) of all its outlet
groups immediately, without a shutdown delay. The UPS and all its outlet groups remain off
Turn UPS Off (user until you turn on its power again.
interface) For a Synchronized Control Group, this action turns off power at all enabled members of
ups -c Off the group. No Shutdown Delay value is used. The UPSs turn off after a few seconds and
(command line remain off until you turn on their power. See “The shutdown option” on page 38.
interface) Note: For a synchronized turn-off action that uses the value of the Shutdown Delay of the
initiating UPS, use SNMP. For the upsAdvControlUpsOff OID, set the value to
turnUpsSyncGroupOffAfterDelay (5).
ups -c GraceOff Turns off outlet power of the UPS and (for a UPS model with outlet groups) all its outlet
(command line groups after the Maximum Required Delay and the configured Shutdown Delay. See
interface) “The PowerChute clients option” on page 41.
(This screen page lists by name and state each outlet group that has been configured through the
Configuration - outlet groups option).
You can select any of the following actions (or no action) for each group. These are one-time actions.
• When the state of the outlet group is off:
– On Immediately
– On with Delay: Turn on the group after the number of seconds configured as Power On Delay.
(see “Power On Delay”).
• When the state of the outlet group is on:
– Off Immediately
– Off with Delay: Turn off the group after the number of seconds configured as Power Off Delay
(see “Power Off Delay”).
– Reboot Immediately: Turn off the group immediately, then turn it on after the number of seconds
configured as Reboot Duration (see “Reboot Duration”) and Power On Delay.
– Reboot with Delay: Turn the outlet group off after the number of seconds configured as Power
Off Delay, then turn it on after the number of seconds configured as Reboot Duration and Power
On Delay.
Configuration Pages
Configure your shutdowns, your upper and lower limit power settings, your Switched Outlet groups (if
relevant) and other parameters with these menu options.
Path: UPS > Configuration
Outlet group name and status. View the name and state of existing outlet groups on this screen page. Click
the name of an outlet group to view or configure its name, sequencing through delays, and load shedding
settings. See “Sequencing settings” and .“Load-shedding options”.
Sequencing settings. Settings vary by UPS model. Use the sequencing options to define how the UPS will
respond to user-issued commands.
Load-shedding options. Settings vary by UPS model. Use the load-shedding options to define how the UPS
will respond to alarms. The UPS provides automatic, sequenced, load shedding when a problem occurs with
input voltage or battery capacity and provides automatic sequenced start-up of outlet groups when the problem
is resolved.
Outlet group events and traps. A change in the state of an outlet group generates the event UPS: Outlet
Group turned on with a severity of Informational, or UPS: Outlet Group turned off with a severity of
Warning. The format of event messages is “UPS: Outlet Group group_number, group_name, action due to
reason”. For example:
UPS: Outlet Group 1, Web Server, turned on.
UPS: Outlet Group 3, Printer, turned off.
By default, the event generates an event log entry, e-mail, and a Syslog message.
If you configure trap receivers for the events, trap 298 is generated when an outlet group turns on, and trap 299
is generated when an outlet group turns off. The event message is the trap argument. The default severity level
is the same as for the event.
Use this option to configure your shutdowns by specifying durations on battery, delays before shutting down
and restarting, minimum runtime and charge before restarting, etc.
This option enables you to use the PowerChute Network Shutdown utility to shut down a maximum
of 50 servers on the network that use a client version of the utility.
UPS shutdown time Max. Required Delay 2 min UPS shutdown delay
(NMC shutdown screen)
2. For a UPS with outlet groups, the shutdown time is the Power Off Delay value on the NMC outlet
groups screen. (This option is not available with all UPS devices).
UPS WITH outlet groups: shutdown time
Note that devices wth the prefix SUM behave like #1 above, not #2.
For both types of UPS, the shutdown time is negotiated by the NMC interacting with PowerChute Network
Shutdown (PCNS).
IF THEN
sec
to equal
PCNS Req. PCNS Req.
NMC Shutdown Max. Req. Delay
for the PCNS is Shutdown
Low Battery Duration Time Time
increased
2.With outlet groups, the Power Off Delay for the outlet group supplying power to the PCNS client.
IF THEN
sec
PCNS Req. to equal
Shutdown Power Off Delay PCNS Req.
NMC Shutdown
Low Battery Duration Time for the PCNS outlet
group is increased Time
*The PCNS SHUTDOWN REQUIRED TIME = the shutdown delay + the shutdown command duration.
When the default of 70 seconds is added, the time is always rounded up to nearest minute. E.g., a
total here of 3 min 50 sec is rounded up to 4 min; a total of 2 min is still rounded up to 3 min.
Notes:
The 70 sec. mentioned is the default OS shutdown time for PCNS.
PCNS never changes the NMC Low Battery Duration field value.
With PCNS v3.x, the Maximum Required Delay value is never used by the NMC for a UPS with
outlet groups.
Settings vary by UPS model. Each UPS model supports only some of the following:
Setting Definition
UPS Name A name to identify the UPS.
UPS Position The physical orientation of the UPS, rack or tower.
Enable or disable the audible alarm of the UPS, and, for some UPS models,
Audible Alarm
define the condition that will cause the alarm to sound.
External Battery Cabinet The battery cabinet Amp-Hour rating of an external battery source.
Use this option to define when the UPS will initiate a self-test.
When you install a PowerChute Network Shutdown client on your network, it is added to this list
automatically. When you uninstall a PowerChute Network Shutdown client, it is removed automatically.
Click Add Client to enter the IP address of a new PowerChute Network Shutdown client. To delete a client,
click the IP address of that client in the list, and then click Delete Client. The list can contain the IP addresses
of up to 50 clients.
Display status of a Synchronized Control Group member. When SCG is enabled, the following
additional information is displayed about the SCG membership of this group member: its IP address, its Input
Status good (acceptable) or bad (not acceptable); and its Output Status (On or Off).
See the online help for information configuring the fields used in synchronizing an SCG.
Diagnostics page
Path: UPS > Diagnostics
You can run a self-test or a runtime calibration for any UPS. The Self-Test and Calibration fields display the
results of the most recent test and calibration.
Select a radio button, and click Apply to perform either of these actions, or to test an alarm. However, the UPS
audible alarm test is model-specific and might not be available for your UPS.
6. For an outlet group only, specify the group by selecting the appropriate button.
7. Signal PowerChute Network Shutdown Clients: Specify whether to notify clients listed as “The
PowerChute clients option”.
This option provides the information about the UPS and the firmware of its Network Management Card,
including the device name of the UPS, its serial number and firmware version, and manufacture date.
Position tells you the physical orientation of the UPS, rack or tower (only for rack- or tower-mounted UPS
models). This field is not available for all UPS models.
Some UPS models report the following additional information: Technical Level, Manufacturer Name, and UPS
Time (The local time at the location of the UPS).
Overview Page
Path: Environment > Overview
The Overview page lists the status of any environmental monitoring device associated with the AP9631 NMC.
This displays the name, alarm status, temperature, and humidity (if supported) for each sensor. Click the name
of a sensor to edit the name and location and to configure its thresholds and its hysteresis.
Thresholds. For each sensor, you set the thresholds for temperature and (if supported) humidity measured at
the sensor. When a threshold is breached (passed), the alarm signals.
Hysteresis. Use the Hysteresis value to avoid getting alarms repeatedly for the same violation of the
temperature or humidity threshold.
When the temperature or humidity that causes a violation tends to waver slightly up and down, it can
repeatedly trigger the alarm. A higher hysteresis value can prevent this.
If the hysteresis value is too low, the wavering can first cause a threshold violation and then clear it, meaning
the alarm can be triggered several times. See the examples below, after noting the following.
• For maximum and high threshold violations, the clearing point for the alarm is the threshold minus the
hysteresis value you input.
• For minimum and low threshold violations, the clearing point is the threshold plus the hysteresis value.
Example of rising but wavering humidity: Say the maximum humidity threshold is 65%, and the humidity
hysteresis is 10%. Then, the humidity rises above 65%, causing an alarm. It then wavers down to 60% and up
Input Contacts on the left menu displays the name, alarm status, and state (open or closed) of each contact.
Click the name of an input contact for detailed status or to configure its values. Use the Input Contact check
box to enable or disable it. When disabled, the contact generates no alarm even when it is in the abnormal
position. Other fields are discussed below:
Parameter Description
Normal if this input contact is not reporting an alarm, or the severity of the alarm if this input
Alarm Status
contact is reporting an alarm
State The current state of this input contact: Closed or Open.
Normal State The normal (non-alarm) state of this input contact: Closed or Open.
The severity of the alarm that the abnormal state of this input contact generates:
Severity
Warning or Critical.
This option is only available for devices with installed Dry Contact I/O Accessories. Select the Environment
tab, then Universal I/O from the top menu bar. Click Output Relay to display the status of the output relay
and configure its values.
Parameter Description
Normal if this output relay is not reporting an alarm, or the severity of the alarm if this output
Alarm Status
relay is reporting an alarm.
State The current state of this output relay: Closed or Open.
Normal State The normal (non-alarm) state of this output relay: Closed or Open.
Control To change the current state of this output relay, check-mark the setting.
The number of seconds a selected alarm condition must exist before the output relay is
activated. Use this setting to avoid activating an alarm for brief transient conditions.
Delay
Note: If additional mapped alarms occur after the delay begins, the delay does not restart but
continues counting down until the output relay is activated.
About Page
Click About on the left navigation menu of the Environment tab to display what environmental monitoring
devices are in use with this UPS and their firmware versions.
On an AP9631 NMC with up to two connected Dry Contact I/O Accessories (AP9810), you can configure the
outputs to respond to events. You can also configure both the UPS and outputs to respond to input alarms.
By default, the log displays all events recorded during the last two days, starting with the latest events. See
“Configuring by event” on page 63
To display the event log (Logs > Events > log):
By default, the event log displays the most recent events first. To see the events listed together on a Web page,
click the Launch Log in New Window button. JavaScript must be enabled in your browser to do this.
You can also use FTP or Secure CoPy (SCP) to view the event log. See “How to use FTP or SCP to
retrieve log files” on page 49
Data log
Path: Path: Logs > Data > options
View a log of measurements about the UPS, the power input to the UPS, and the ambient temperature of the
UPS and batteries.
The steps to display and resize the data log are the same as for the event log, except that you use menu options
under Data instead of Events. See “To display the event log (Logs > Events > log):” and “To resize the event
log (Logs > Events > size):”
To filter the data log by date or time, use the Last or From radio buttons. (The filter configuration is saved
until the NMC restarts).To delete all data recorded in the data log, click Clear Data Log. Deleted data cannot
be retrieved.
To set the data collection interval (Logs > Data > interval): Define, in the Log Interval setting, how
frequently data is sampled and stored in the data log. When you click Apply, the number of possible storage
days is recalculated and display at the top of the screen.
When the log is full, the oldest entries are deleted. To avoid automatic deletion of older data, see “To configure
data log rotation (Logs > Data > rotation):”.
To configure data log rotation (Logs > Data > rotation):
Rotation causes the contents of the data log to be appended to the file you specify by name and location. This
means you can store the data before it is deleted, see “To set the data collection interval (Logs > Data >
interval):”
Use this option to set up password-protection, to specify an FTP Server Address, and other parameters.
If you are using the encryption-based security protocols, see “To use SCP to retrieve the files”. If you are using
unencrypted authentication methods for security, see “To use FTP to retrieve the files”.
See the Security Handbook, available on the Network Management Card Utility CD and on the
website (www.apc.com) for information on available protocols and methods for setting up the type
of security you need.
2. Use the case-sensitive User Name and Password for Administrator or Device User to log on. For
Administrator, apc is the default for User Name and Password. For the Device User, the defaults are
device for User Name and apc for Password.
3. Use the get command to transmit the text of a log to your local drive.
ftp>get event.txt
or
ftp>get data.txt
4. You can use the del command to clear the contents of either log.
ftp>del event.txt
or
ftp>del data.txt
You will not be asked to confirm the deletion.
• If you clear the data log, the event log records a deleted-log event.
• If you clear the event log, a new event.txt file records the event.
5. Type quit at the ftp> prompt to exit from FTP.
Remote Users
Authentication
Path: Administration > Security > Remote Users > authentication
Use this option to select how to administer remote access to the NMC.
For information about local authentication (not using the centralized authentication of a RADIUS
server), see the Security Handbook, available on the Utility CD and on the www.apc.com website at
www.apc.com.
The authentication and authorization functions of RADIUS (Remote Authentication Dial-In User Service)
are supported.
• When a user accesses the Network Management Card or other network-enabled device that has
RADIUS enabled, an authentication request is sent to the RADIUS server to determine the user’s
permission level.
• RADIUS user names used with the Network Management Card are limited to 32 characters.
Select one of the following:
• Local Authentication Only: RADIUS is disabled.
• RADIUS, then Local Authentication: Both are enabled. Authentication is requested from the
RADIUS server first. If the RADIUS server fails to respond, local authentication is used.
• RADIUS Only: RADIUS is enabled.
If RADIUS Only is selected, and the RADIUS server is unavailable, improperly identified,
or improperly configured, remote access is unavailable to all users. To regain access, you
must use a serial connection to the command line interface and change the access setting to
local or radiusLocal.
For example, the command to change the access setting to local would be: radius -a
local
1. Add the IP address of the NMC to the RADIUS server client list (file).
2. Users must be configured with Service-Type attributes unless Vendor Specific Attributes (VSAs) are
defined. If no Service-Type attributes are configured, users will have read-only access (on the user
interface only).
See your RADIUS server documentation for information about the RADIUS users file, and
see the Security Handbook for an example.
3. VSAs can be used instead of the Service-Type attributes provided by the RADIUS server.
VSAs require a dictionary entry and a RADIUS user’s file. In the dictionary file, define the names for
the ATTRIBUTE and VALUE keywords, but not for the numeric values. If you change numeric values,
RADIUS authentication and authorization will fail. VSAs take precedence over standard RADIUS
attributes.
Inactivity Timeout
Path: Administration > Security > Auto Log Off
Use this option to configure the time (3 minutes by default) that this user interface waits before logging off an
inactive user. If you change this value, you must log off for the change to take effect.
This timer continues to run if you close the browser window without first logging off (by clicking
Log Off at the upper right). In that circumstance, no one else can log on until the time specified as
Minutes of Inactivity expires.
For example, with Minutes of Inactivity at 10 minutes, if you close the browser window without
logging off, no one else can log on for 10 minutes.
The TCP/IP option on the left navigation menu displays the current IPv4 address, subnet mask, default
gateway, MAC address, and boot mode of the UPS Network Management Card 2 (NMC).
For information on DHCP and DHCP options, see RFC2131 and RFC2132.
See the user interface online help for details on the options: Manual, BOOTP, DHCP.
See the user interface online help for details on the options: Manual, Auto Configuration, DHCPv6 Mode.
Ping Response
Path: Administration > Network > Ping Response
Select the Enable check box for IPv4 Ping Response to allow the Network Management Card 2 to respond to
network pings. Clear the check box to disable an NMC response. This does not apply to IPv6.
Port Speed
Path: Administration > Network > Port Speed
The Port Speed setting defines the communication speed of the TCP/IP port.
• For Auto-negotiation (the default), Ethernet devices negotiate to transmit at the highest possible
speed, but if the supported speeds of two devices are unmatched, the slower speed is used.
• Alternatively, you can choose 10 Mbps or 100 Mbps, each with the option of half-duplex
(communication in only one direction at a time) or full-duplex (communication in both directions on
the same channel simultaneously).
DNS
Path: Administration > Network > DNS > options
Use the options under DNS on the left navigation menu to configure and test the Domain Name System (DNS):
• Select Primary DNS Server or Secondary DNS Server to specify the IPv4 or IPv6 addresses of the
primary and optional secondary DNS server. For the NMC to send e-mail, you must at least define the
IP address of the primary DNS server.
– The NMC waits up to 15 seconds for a response from the primary DNS server or the secondary
DNS server (if a secondary DNS server is specified). If the NMC does not receive a response
– View the result of the test DNS request in the Last Query Response field.
A Console session means you’re using the command line interface, see Command Line Interface (CLI).
Option Description
Choose one of the following for access by Telnet or Secure SHell (SSH):
• Disable: Disables all access to the command line interface.
• Enable Telnet (the default): Telnet transmits user names, passwords, and data without
encryption.
• Enable SSH: SSH transmits user names, passwords, and data in encrypted form, providing
protection from attempts to intercept, forge, or alter data during transmission.
Configure the ports to be used by these protocols:
• Telnet Port: The Telnet port used to communicate with the NMC (23 by default). You can
access change the port setting to any unused port from 5000 to 32768 for additional security. Users
must then use a colon (:) or a space, as required by your Telnet client program, to specify the
non-default port. For example, for port 5000 and an IP address of 152.214.12.114, your Telnet
client requires one of the these commands:
telnet 152.214.12.114:5000
telnet 152.214.12.114 5000
• SSH Port: The SSH port used to communicate with the NMC (22 by default). You can change
the port setting to any unused port from 5000 to 32768 for additional security. See the
documentation for your SSH client for the command line format required to specify a non-
default port.
Status indicates the status of the host key (private key).
• SSH Disabled: No host key in use.
• Generating: The NMC is creating a host key because no valid host key was found.
• Loading: A host key is being activated on the NMC.
• Valid: One of the following valid host keys is in the /ssh directory (the required location on
the Network Management Card):
ssh host key •A 1024-bit or 2048-bit host key created by the Security Wizard
•A 2048-bit RSA host key generated by the Network Management Card
Add or Replace: Upload a host key file created by the Security Wizard. To use the Security
Wizard, see the Security Handbook on the Network Management Card Utility CD.
Note: To reduce the time required to enable SSH, create and upload a host key in advance. If
you enable SSH with no host key loaded, the NMC takes up to one minute to create a host key,
and the SSH server is not accessible during that time.
To use SSH, you must have an SSH client installed. Most Linux and other UNIX platforms include
an SSH client, but Microsoft Windows operating systems do not. Clients are available from various
vendors.
SNMP
All user names, passwords, and community names for SNMP are transferred over the network as plain text. If
your network requires the high security of encryption, disable SNMP access or set the access for each
community to Read. (A community with Read access can receive status information and use SNMP traps.)
SNMPv1
Path: Path: Administration > Network > SNMPv1 > options
Enable SNMPv1 access under access enables SNMP version 1 as a method of communication with this device.
access control. You can configure up to four access control entries to specify which Network Management
Systems (NMSs) have access to this device. The opening page for access control, by default, assigns one entry
to each of the four available SNMPv1 communities, but you can edit these settings to apply more than one
entry to any community to grant access by several specific IPv4 and IPv6 addresses, host names, or IP address
masks. To edit the access control settings for a community, click its community name.
• If you leave the default access control entry unchanged for a community, that community has access to
this device from any location on the network.
• If you configure multiple access control entries for one community name, the limit of four entries
requires that one or more of the other communities must have no access control entry. If no access
control entry is listed for a community, that community has no access to this device.
Community Name: The name that an NMS must use to access the community. The maximum length is 15
ASCII characters, and the default community names for the four communities are public, private,
public2, and private2.
NMS IP/Host Name: The IPv4 or IPv6 address, IP address mask, or host name that controls access by NMSs.
A host name or a specific IP address (such as 149.225.12.1) allows access only by the NMS at that location. IP
addresses that contain 255 restrict access as follows:
• 149.225.12.255: Access only by an NMS on the 149.225.12 segment.
• 149.225.255.255: Access only by an NMS on the 149.225 segment.
• 149.255.255.255: Access only by an NMS on the 149 segment.
• 0.0.0.0 (the default setting) which can also be expressed as 255.255.255.255: Access by any NMS on
any segment.
Access Type: The actions an NMS can perform through the community.
• Read: GETS only, at any time
• Write: GETS at any time, and SETS when no user is logged onto the user interface or command line
interface.
• Write+: GETS and SETS at any time.
• Disable: No GETS or SETS at any time.
SNMPv3
Path: Path: Administration > Network > SNMPv3 > options
For SNMP GETs, SETs, and trap receivers, SNMPv3 uses a system of user profiles to identify users. An
SNMPv3 user must have a user profile assigned in the MIB software program to perform GETs and SETs,
Enable SNMPv3 access under access enables SNMP version 3 as a method of communication with this device.
Option Description
By default, lists the settings of four user profiles, configured with the user names apc snmp profile1
through apc snmp profile4, and no authentication and no privacy (no encryption). To edit the following
settings for a user profile, click a user name in the list.
User Name: The identifier of the user profile. SNMP version 3 maps GETs, SETs, and traps to a user
profile by matching the user name of the profile to the user name in the data packet being transmitted. A
user name can have up to 32 ASCII characters.
Authentication Passphrase: A phrase of 15 to 32 ASCII characters (apc auth passphrase, by
default) that verifies that the NMS communicating with this device through SNMPv3 is the NMS it
claims to be, that the message has not been changed during transmission, and that the message was
communicated in a timely manner, indicating that it was not delayed and that it was not copied and sent
user again later at an inappropriate time.
profiles
Privacy Passphrase: A phrase of 15 to 32 ASCII characters (apc crypt passphrase, by default)
that ensures the privacy of the data (by means of encryption) that an NMS is sending to this device or
receiving from this device through SNMPv3.
Authentication Protocol: The implementation of SNMPv3 supports SHA and MD5 authentication.
Authentication will not occur unless an authentication protocol is selected.
Privacy Protocol: The implementation of SNMPv3 supports AES and DES as the protocols for
encrypting and decrypting data. Privacy of transmitted data requires that a privacy protocol is selected
and that a privacy passphrase is provided in the request from the NMS. When a privacy protocol is
enabled but the NMS does not provide a privacy passphrase, the SNMP request is not encrypted.
Note:You cannot select the privacy protocol if no authentication protocol is selected.
FTP Server
Path: Path: Administration > Network > FTP Server
The FTP Server settings enable or disable access to the FTP server and specify the TCP/IP port (21 by default)
that the FTP server uses to communicate with the NMC. The FTP server uses both the specified port and the
port one number lower than the specified port.
You can change the Port setting to the number of any unused port from 5001 to 32768 for added security.
Users must then use a colon (:) to specify the non-default port number. For example, for port 5001 and IP
address 152.214.12.114, the command would be ftp 152.214.12.114:5001.
FTP transfers files without encryption. For higher security, disable the FTP server, and transfer files
with SCP. Selecting and configuring Secure SHell (SSH) enables SCP automatically.
At any time that you want a UPS to be accessible for management by InfraStruxure Central, FTP
Server must be enabled in the NMC interface of that UPS.
For detailed information on enhancing and managing the security of your system, see the Security
Handbook, available on the Network Management Card Utility CD or from the www.apc.com
website.
Types of notification
You can configure notification actions to occur in response to an event or a group of events. You can notify
users of an event in any of several ways:
• Active, automatic notification. The specified users or monitoring devices are contacted directly.
– E-mail notification
– SNMP traps
– Remote Monitoring Service
– Syslog notification
• Indirect notification
– Event log. If no direct notification is configured, users must check the log to determine which
events have occurred
You can also log system performance data to use for device monitoring. See “Data
log” on page 49 for information on how to configure and use this data logging option.
Parameter Description
Delay x time before If the event persists for the specified time, notification is sent. If the condition clears
sending before the time expires, no notification is sent.
Repeat at an interval
The notification is sent at the specified interval (e.g., every 2 minutes).
of x time
Up to x times During an active event, the notification repeats for this number of times.
When viewing details of an event’s configuration, you can change the configuration, enable
or disable event logging or Syslog, or disable notification for specific e-mail recipients or
trap receivers, but you cannot add or remove recipients or receivers. To add or remove
recipients or receivers, see the following:
• “Identifying Syslog servers” on page 66
• “E-mail recipients” on page 64
• “Trap Receivers” on page 65
Configuring by group. To configure a group of events simultaneously:
1. Select the Administration tab, Notification on the top menu bar, and by group under Event Actions
on the left navigation menu.
2. Choose how to group events for configuration:
– Choose Grouped by severity, and then select all events of one or more severity levels. You
cannot change the severity of an event.
– Choose Grouped by category, and then select all events in one or more pre-defined categories.
3. Click Next>> to move from page to page to do the following:
a. Select event actions for the group of events.
• To choose any action except Logging (the default), you must first have at least one
relevant recipient or receiver configured.
• If you choose Logging and have configured a Syslog server, select Event Log or Syslog
(or both) on the next page.
b. Select whether to leave the newly configured event action enabled for this group of events or to
disable the action.
SMTP.
Path: Administration > Notification > E-mail > server
Setting Description
Local The IPv4/ IPv6 address or DNS name of the local SMTP server.
SMTP Note: This definition is required only when SMTP Server is set to Local. See “E-mail recipients” on
Server page 64.
The contents of the From field in e-mail messages sent by the NMC:
• In the format user@ [IP_address] (if an IP address is specified as Local SMTP Server)
From • In the format user@domain (if DNS is configured and the DNS name is specified as Local SMTP
Address Server) in the e-mail messages.
Note: The local SMTP server may require that you use a valid user account on the server for this setting.
See the server’s documentation.
E-mail recipients.
Path: Administration > Notification > E-mail > recipients
Setting Description
The user and domain names of the recipient. To use e-mail for paging, use the e-mail address for the
recipient’s pager gateway account (for example, myacct100@skytel.com). The pager gateway
will generate the page.
To Address To bypass the DNS lookup of the mail server’s IP address, use the IP address in brackets instead of
the e-mail domain name, e.g., use jsmith@[xxx.xxx.x.xxx] instead of jsmith@company.com. This is
useful when DNS lookups are not working correctly.
Note: The recipient’s pager must be able to use text-based messaging.
E-mail
Enables (default) or disables sending e-mail to the recipient.
Generation
Select one of the following methods for routing e-mail:
• Local: Through the site-local SMTP server. This recommended setting ensures that the e-mail is
SMTP Server sent using the site-local SMTP server.
• Recipient: Through the recipient's SMTP server. The NMC performs an MX record look-up on the
recipients e-mail address and uses that as its SMTP server.
The long format contains Name, Location, Contact, IP address, serial number of the device, date and
Format
time, event code, and event description. The short format provides only the event description.
Chose a language from the drop-down list and any mails will be sent in that language. It is possible to
Language
use different languages for different users. See “Adding and Changing Language Packs” on page 80.
E-mail test.
Path: Administration > Notification > E-mail > test
SNMP traps
Trap Receivers.
Path: Administration > Notification > SNMP Traps > trap receivers
The trap receivers are displayed by NMS IP/Host Name, where NMS stands for Network Management System.
You can configure up to six trap receivers.
To configure a new trap receiver, click Add Trap Receiver. To edit (or delete) one, click its IP address/ host
name.
If you delete a trap receiver, all notification settings configured under “Event Actions” for the deleted trap
receiver are set to their default values.
Select either the SNMPv1 or SNMPv3 radio button to specify the trap type. For an NMS to receive both types
of traps, you must seperately configure two trap receivers for that NMS, one for each trap type.
Item Definition
Trap Generation Enable (the default) or disable trap generation for this trap receiver.
Choose between these two MIB trap generation types for each trap created.
The RFC1628 is the generic, standard Management Information Base (MIB) for
UPS devices. The Powernet option is customized for Schneider Electric and contains
Powernet MIB Trap Generation/
many additional variables relevant to the company’s products.
RFC1628 "
If you use the RFC1628 MIB, you can also use the three RFC1628 event
notifications (see “Event Actions”). They can be used to avoid having to configure
notification events outside the NMC environment, see RFC1628 MIB.
The IPv4/ IPv6 address or host name of this trap receiver. The default, 0.0.0.0, leaves
NMS IP/Host Name
the trap receiver undefined.
Chose a language from the drop-down list. This can differ from the UI and from
Language
other trap receivers.
SNMPv1 option.
Item Definition
The name (public by default) used as an identifier when SNMPv1 traps are sent to
Community Name
this trap receiver.
When this option is enabled (the default), the NMS identified by the NMS IP/Host
Authenticate Traps Name setting will receive authentication traps (traps generated by invalid attempts to
log on to this device).
Last Test Result. The result of the most recent SNMP trap test. A successful SNMP trap test verifies only
that a trap was sent; it does not verify that the trap was received by the selected trap receiver. A trap test
succeeds if all of the following are true:
• The SNMP version (SNMPv1 or SNMPv3) configured for the selected trap receiver is enabled on this
device.
• The trap receiver is enabled.
• If a host name is selected for the To address, that host name can be mapped to a valid IP address.
To. Select the IP address or host name to which a test SNMP trap will be sent. If no trap receiver is configured,
a link to the Trap Receiver configuration page is displayed.
The Remote Monitoring Service (RMS) is an optional service that monitors your system from a remote
operation center 24 hours a day, 7 days a week, and notifies you of device and system events.
To purchase the RMS service, contact your vendor or click on the link on the top part of this screen
page: RMS website.
Registration. To activate RMS for the NMC, select Enable Remote Monitoring Service., choose between
Register Company and Device and Register Device Only, complete the form, and click Send RMS
Registration.
Use the Reset Remote Monitoring Service Registration check box to discontinue the service, whether
permanently or temporarily (for example, if you are moving an NMC).
Syslog
Path: Logs > Syslog > options
The NMC can send messages to up to four Syslog servers when an event occurs. The Syslog servers record
events that occur at network devices in a log that provides a centralized record of events.
This user’s guide does not describe Syslog or its configuration values in detail. See RFC3164 for
more information about Syslog.
Syslog settings.
Path: Logs > Syslog > settings
Setting Definition
Message
Enables (by default) or disables the Syslog feature.
Generation
Selects the facility code assigned to the NMC’s Syslog messages (User, by default).
Facility Code Note: User best defines the Syslog messages sent by the NMC. Do not change this selection
unless advised to do so by the Syslog network or system administrator.
Maps each severity level of NMC or Environment events to available Syslog priorities. You
should not need to change the mappings.
The following definitions are from RFC3164:
• Emergency: The system is unusable
• Alert: Action must be taken immediately
• Critical: Critical conditions
• Error: Error conditions
Severity • Warning: Warning conditions
Mapping • Notice: Normal but significant conditions
• Informational: Informational messages
• Debug: Debug-level messages
Following are the default settings for the Local Priority settings:
• Severe is mapped to Critical
• Warning is mapped to Warning
• Informational is mapped to Info
Note: To disable Syslog messages, see “Configuring event actions” on page 62.
Send a test message to the Syslog servers (where were configured through the servers option).
Select a severity to assign to the test message and then define the test message:
• The priority (PRI): the Syslog priority assigned to the message’s event, and the facility code of
messages sent by the NMC.
• The Header: a time stamp and the IP address of the NMC.
• The message (MSG) part:
– The TAG field, followed by a colon and space, identifies the event type.
– The CONTENT field is the event text, followed (optionally) by a space and the event code.
For example, APC: Test Syslog is valid.
Define the Name (the device name), Location (the physical location), and Contact (the person responsible for
the device) used by InfraStruxure Central, InfraStruxure Manager, and the SNMP agent of the UPS Network
Management Card 2 (NMC). These settings are the values used for the MIB-II sysName, sysContact, and
sysLocation Object Identifiers (OIDs).
For more information about MIB-II OIDs, see the PowerNet® SNMP Management Information
Base (MIB) Reference Guide, available on the Network Management Card Utility CD and the
website, www.apc.com.
The Name and Location fields also identify the device when you register for the Remote Monitoring Service.
See “Remote Monitoring Service” on page 66 for more information.
Set the time and date used by the NMC. You can change the current settings manually or through a Network
Time Protocol (NTP) Server:
• Manual Mode: Do one of the following:
– Enter the date and time for the NMC.
– Mark the check box Apply Local Computer Time to match the date and time settings of the
computer you are using.
• Synchronize with NTP Server: Have an NTP Server define the date and time for the NMC.
By default, any NMC on the private side of an InfraStruxure Central obtains its time settings
by using InfraStruxure Central as an NTP server.
Setting Definition
Primary NTP Server Enter the IP address or domain name of the primary NTP server.
Enter the IP address or domain name of the secondary NTP server, when a
Secondary NTP Server
secondary server is available.
Select a time zone. The number of hours preceding each time zone in the list
Time Zone is the offset from Coordinated Universal Time (UTC), formerly Greenwich
Mean Time.
Define how often, in hours, the NMC accesses the NTP Server for an
Update Interval
update. Minimum: 1; Maximum: 8760 (1 year).
Update Using NTP Now Initiate an immediate update of the date and time by the NTP Server.
Enable traditional United States Daylight Saving Time (DST), or enable and configure a customized daylight
saving time to match how Daylight Saving Time is implemented in your local area. DST is disabled by default.
When customizing Daylight Saving Time (DST):
• If the local DST always starts or ends on the fourth occurrence of a specific weekday of a month (e.g,
the fourth Sunday), choose Fourth/Last. If a fifth Sunday occurs in that month in a subsequent year,
the time setting still changes on the fourth Sunday.
• If the local DST always starts or ends on the last occurrence of a specific weekday of a month, whether
it is the fourth or the fifth occurrence, choose Fifth/Last.
Format
Path: Administration > General > Date & Time > date format
Select the numerical format in which to display all dates in this user interface. In the selections, each letter m
(for month), d (for day), and y (for year) represents one digit. Single-digit days and months are displayed with
a leading zero.
Use the settings from one NMC to configure another. Retrieve the config.ini file from the configured NMC,
customize that file (e.g., to change the IP address), and upload the customized file to the new NMC. The file
name can be up to 64 characters, and must have the.ini suffix.
Reports the progress of the upload. The upload succeeds even if the file contains errors, but a
Status
system event reports the errors in the event log.
Browse to the customized file and upload it so that the current NMC can use it to set its own
Upload
configuration.
To retrieve and customize the file of a configured NMC, see “How to Export Configuration
Settings” on page 73.
Instead of uploading the file to one NMC, you can export the file to multiple NMCs by using an FTP
or SCP script or a batch file and the .ini file utility, available from www.apc.com/tools/download.
Action Definition
Reboot
Management Restarts the interface of the NMC.
Interface
Clear the Exclude TCP/IP check box to reset all configuration values; mark the Exclude
Reset All1
TCP/IP check box to reset all values except TCP/IP
1. Resetting may take up to a minute. The UPS name will not be reset.
Configure Links
Path: Administration > General > Quick Links
Select the Administration tab, General on the top menu bar, and Quick Links on the left navigation menu to
view and change the URL links displayed at the bottom left of each page of the interface.
By default, these links access the following Web pages:
• Link 1: the Knowledge Base page of the www.apc.com website
• Link 2: the Product Information page of the www.apc.com website
• Link 3: the downloads page of the www.apc.com website
To reconfigure any of the following, click the link name in the Display column:
• Display: The short link name displayed on each interface page
• Name: A name that fully identifies the target or purpose of the link
• Address: Any URL — for example, the URL of another device or server
The hardware information is useful to Customer Support for troubleshooting problems with the NMC. The
serial number and MAC address are also available on the NMC itself.
Firmware information for the Application Module, American Power Conversion OS (AOS), and Boot Monitor
indicates the name, the firmware version, and the date and time each firmware module was created. This
information is also useful in troubleshooting and enables you to determine if updated firmware is available at
the www.apc.com website.
Management Uptime is the length of time the interface has been running continuously.
System requirements
The Wizard runs on Microsoft Windows 2000, Windows Server® 2003, and on both 32- and 64-bit versions of
Windows XP, Windows Vista, Windows 2008, and Windows 7 operating systems.
Installation
To install the Wizard from the Utility CD:
1. If autorun is enabled, the user interface of the CD starts when you insert the CD. Otherwise, open the
file contents.htm on the CD.
2. Click Device IP Configuration Wizard and follow the instructions.
To install the Wizard from a downloaded executable file:
1. Go to www.apc.com/tools/download.
2. Download the Device IP Configuration Wizard.
3. Run the executable file in the folder to which you downloaded it.
Detailed procedures
Retrieving. To set up and retrieve an .ini file to export:
1. If possible, use the interface of an NMC to configure it with the settings to export. Directly editing the
.ini file risks introducing errors.
2. To use FTP to retrieve config.ini from the configured NMC:
a. Open a connection to the NMC, using its IP address:
ftp> open ip_address
The file is written to the folder from which you launched FTP.
To retrieve configuration settings from multiple NMCs and export them to other NMCs, see Release
Notes: ini File Utility, version 1.0, available on the Network Management Card Utility CD and at
www.apc.com.
Customizing. You must customize the file before you export it.
1. Use a text editor to customize the file.
Messages in config.ini
A device associated with the NMC from which you download the config.ini file must be discovered
successfully in order for its configuration to be included. If the device (such as a UPS) is not present or is not
discovered, the config.ini file contains a message under the appropriate section name, instead of keywords and
values. For example:
UPS not discovered
If you did not intend to export the configuration of the device as part of the .ini file import, ignore these
messages.
See “Contents of the .ini file” on page 73 for information about which values are overridden.
Because the overridden values are device-specific and not appropriate to export to other NMCs,
ignore these error messages. To prevent these error messages, delete the lines that contain the Override
keyword and the lines that contain the values that they override. Do not delete or change the line containing the
section heading.
Related Topics
On Windows operating systems, instead of transferring .ini files, you can use the Device IP Configuration
Wizard to update the basic TCP/IP settings of the NMC and configure other settings through its user interface.
Obtain the free, latest firmware version from www.apcc.com/tools/download. To upgrade the firmware of one
or more NMCs, use one of these five methods:
• On a Windows operating system, use the Firmware Upgrade Utility downloaded from the
www.apc.com website. See “Using the Firmware Upgrade Utility”.
• On any supported operating system, use FTP or SCP to transfer the individual AOS and application
firmware modules. See “Use FTP or SCP to upgrade one Network Management Card”.
• For a Network Management Card that is NOT on your network, use XMODEM through a serial
connection to transfer the individual firmware modules from your computer to the NMC.
See “Use XMODEM to upgrade one NMC”.
• Use a USB drive to transfer the individual firmware modules from your computer (AP9631 only).
See “Use a USB drive to transfer and upgrade the files (AP9631 only)”.
• For upgrades to multiple NMCs, see “Upgrading the firmware on multiple Network Management
Cards” and “Using the Firmware Upgrade Utility for multiple upgrades on Windows”.
Use a USB drive to transfer and upgrade the files (AP9631 only)
Before starting the transfer, make sure the USB drive is formatted in FAT32.
1. Download the firmware upgrade files and unzip them.
2. Create a folder named apcfirm on the USB flash drive.
3. Place the extracted module files in the apcfirm directory.
4. Use a text editor to create a file named upload.rcf. (The file extension must be .rcf, not .txt for
example.)
Using the Firmware Upgrade Utility for multiple upgrades on Windows. After downloading the
Upgrade Utility from the NMC downloads page on the www.apc.com website, double click on the exe file to
run the utility (which ONLY works with IPv4) and follow these steps to upgrade your NMC firmware:
1. In the utility dialog, type in an IP address, a user name, and a password, and choose the Ping button if
you need to verify the IP address.
2. Choose the Device List button to open the iplist.txt file. Here you should type all UPS devices to
upgrade with the necessary information: IP, user name, and password.
For example,
SystemIP=192.168.0.1
SystemUserName=apc
SystemPassword=apc
You can use an existing iplist.txt file if it already exists.
3. Select the Upgrade From Device List check box to use the iplist.txt file.
4. Choose the Upgrade Now button to start the firmware version upgrade(s).
5. Choose View Log to verify any upgrade.
Problem Solution
If the NMC’s Status LED is green, try to ping another node on the same
network segment as the NMC. If that fails, it is not a problem with the NMC.
If the Status LED is not green, or if the ping test succeeds, perform the
following checks:
• Verify that the NMC is properly seated in the UPS.
Unable to ping the NMC • Verify all network connections.
• Verify the IP addresses of the NMC and the NMS.
• If the NMS is on a different physical network (or subnetwork) from the
NMC, verify the IP address of the default gateway (or router).
• Verify the number of subnet bits for the NMC’s subnet mask.
Cannot allocate the
Before you can use a terminal program to configure the NMC, you must shut
communications port through a
down any application, service, or program using the communications port.
terminal program
Cannot access the command
Make sure that you did not change the baud rate. Try 2400, 9600, 19200, or
line interface through a serial
38400.
connection
• Make sure you are using the correct access method, Telnet or Secure SHell
(SSH). An Administrator can enable these access methods. By default,
Cannot access the command Telnet is enabled. Enabling SSH automatically disables Telnet.
line interface remotely
• For SSH, the NMC may be creating a host key. The NMC can take up to one
minute to create the host key, and SSH is inaccessible for that time.
• Verify that HTTP or HTTPS access is enabled.
• Make sure you are specifying the correct URL — one that is consistent with
the security system used by the NMC. SSL requires https, not http, at the
beginning of the URL.
Cannot access the user • Verify that you can ping the NMC.
interface • Verify that you are using a Web browser supported for the NMC. See
“Supported Web browsers” on page 28.
• If the NMC has just restarted and SSL security is being set up, the NMC
may be generating a server certificate. The NMC can take up to one minute
to create this certificate, and the SSL server is not available during that time.
Problem Solution
• Verify the read (GET) community name (SNMPv1) or the user profile configuration
Unable to perform a (SNMPv3).
GET • Use the command line interface or user interface to ensure that the NMS has access.
See “SNMP” on page 58.
• Verify the read/write (SET) community name (SNMPv1) or the user profile
configuration (SNMPv3).
Unable to perform a
SET • Use the command line interface or user interface to ensure that the NMS has write
(SET) access (SNMPv1) or is granted access to the target IP address through the
access control list (SNMPv3). See “SNMP” on page 58.
• Make sure the trap type (SNMPv1 or SNMPv3) is correctly configured for the NMS
as a trap receiver.
• For SNMP v1, query the mconfigTrapReceiverTable MIB OID to verify that the
NMS IP address is listed correctly and that the community name defined for the NMS
Unable to receive traps matches the community name in the table. If either is not correct, use SETs to the
at the NMS mconfigTrapReceiverTable OIDs, or use the command line interface or user
interface to correct the trap receiver definition.
• For SNMPv3, check the user profile configuration for the NMS, and run a trap test.
See “SNMP” on page 58, “Trap Receivers” on page 65, and “SNMP Trap Test” on
page 66.
Traps received at an See your NMS documentation to verify that the traps are properly integrated in the
NMS are not identified alarm/trap database.
Synchronization Problems
Problem Solution
A Synchronized Control Group Make sure the group member’s status is set to Enabled. Also check the
member does not participate in a group member’s battery capacity, if the synchronized action required
synchronized action. UPSs to turn on.
The values for Multicast IP Address, Synchronized Control Group
An attempt to add a member to a
Number, and firmware version must match those of other members of
Synchronized Control Group fails.
the group.
netstat uio
[-rc <dI> [open | close]
[-st <port # | port #]]
[-disc <port # | port #]]
Terms of warranty
APC warrants its products to be free from defects in materials and workmanship for a period of two years from
the date of purchase. APC will repair or replace defective products covered by this warranty. This warranty
does not apply to equipment that has been damaged by accident, negligence or misapplication or has been
altered or modified in any way. Repair or replacement of a defective product or part thereof does not extend the
original warranty period. Any parts furnished under this warranty may be new or factory-remanufactured.
Non-transferable warranty
This warranty extends only to the original purchaser who must have properly registered the product. The
product may be registered at the APC Web site, www.apc.com.
Exclusions
APC shall not be liable under the warranty if its testing and examination disclose that the alleged defect in the
product does not exist or was caused by end user’s or any third person’s misuse, negligence, improper
installation or testing. Further, APC shall not be liable under the warranty for unauthorized attempts to repair or
modify wrong or inadequate electrical voltage or connection, inappropriate on-site operation conditions,
corrosive atmosphere, repair, installation, exposure to the elements, Acts of God, fire, theft, or installation
contrary to APC recommendations or specifications or in any event if the APC serial number has been altered,
defaced, or removed, or any other cause beyond the range of the intended use.
THERE ARE NO WARRANTIES, EXPRESS OR IMPLIED, BY OPERATION OF LAW OR
OTHERWISE, OF PRODUCTS SOLD, SERVICED OR FURNISHED UNDER THIS AGREEMENT
OR IN CONNECTION HEREWITH. APC DISCLAIMS ALL IMPLIED WARRANTIES OF
MERCHANTABILITY, SATISFACTION AND FITNESS FOR A PARTICULAR PURPOSE. APC
EXPRESS WARRANTIES WILL NOT BE ENLARGED, DIMINISHED, OR AFFECTED BY AND
NO OBLIGATION OR LIABILITY WILL ARISE OUT OF, APC RENDERING OF TECHNICAL OR
OTHER ADVICE OR SERVICE IN CONNECTION WITH THE PRODUCTS. THE FOREGOING
WARRANTIES AND REMEDIES ARE EXCLUSIVE AND IN LIEU OF ALL OTHER
WARRANTIES AND REMEDIES. THE WARRANTIES SET FORTH ABOVE CONSTITUTE APC’S
SOLE LIABILITY AND PURCHASER’S EXCLUSIVE REMEDY FOR ANY BREACH OF SUCH
WARRANTIES. APC WARRANTIES EXTEND ONLY TO PURCHASER AND ARE NOT
EXTENDED TO ANY THIRD PARTIES.
IN NO EVENT SHALL APC, ITS OFFICERS, DIRECTORS, AFFILIATES OR EMPLOYEES BE
LIABLE FOR ANY FORM OF INDIRECT, SPECIAL, CONSEQUENTIAL OR PUNITIVE
DAMAGES, ARISING OUT OF THE USE, SERVICE OR INSTALLATION, OF THE PRODUCTS,
WHETHER SUCH DAMAGES ARISE IN CONTRACT OR TORT, IRRESPECTIVE OF FAULT,
NEGLIGENCE OR STRICT LIABILITY OR WHETHER APC HAS BEEN ADVISED IN ADVANCE
OF THE POSSIBILITY OF SUCH DAMAGES. SPECIFICALLY, APC IS NOT LIABLE FOR ANY
COSTS, SUCH AS LOST PROFITS OR REVENUE, LOSS OF EQUIPMENT, LOSS OF USE OF
EQUIPMENT, LOSS OF SOFTWARE, LOSS OF DATA, COSTS OF SUBSTITUENTS, CLAIMS BY
THIRD PARTIES, OR OTHERWISE.
NO SALESMAN, EMPLOYEE OR AGENT OF APC IS AUTHORIZED TO ADD TO OR VARY THE
TERMS OF THIS WARRANTY. WARRANTY TERMS MAY BE MODIFIED, IF AT ALL, ONLY IN
WRITING SIGNED BY AN APC OFFICER AND LEGAL DEPARTMENT.
USA—FCC
This equipment has been tested and found to comply with the limits for a Class A digital device,
pursuant to part 15 of the FCC Rules. These limits are designed to provide reasonable protection
against harmful interference when the equipment is operated in a commercial environment. This
equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in
accordance with this user manual, may cause harmful interference to radio communications. Operation
of this equipment in a residential area is likely to cause harmful interference. The user will bear sole
responsibility for correcting such interference.
Canada—ICES
This Class A digital apparatus complies with Canadian ICES-003.
Cet appareil numérique de la classe A est conforme à la norme NMB-003 du Canada.
Japan—VCCI
This is a Class A product based on the standard of the Voluntary Control Council for Interference by
Information Technology Equipment (VCCI). If this equipment is used in a domestic environment,
radio disturbance may occur, in which case, the user may be required to take corrective actions.
この装置は、情報処理装置等電波障害自主規制協議会(VCCI)の基準
に基づくクラス A 情報技術装置です。この装置を家庭環境で使用すると、電波
妨害を引き起こすことがあります。この場合には、使用者が適切な対策を講ず
るように要求されることがあります。
Taiwan—BSMI
警告使用者 :
這是甲類的資訊產品 , 在居住的
環境中使用時 , 可能會造成射頻
干擾 , 在這種情況下 , 使用者會
被要求採取某些適當的對策。
Australia and New Zealand
Attention: This is a Class A product. In a domestic environment this product may cause radio
interference in which case the user may be required to take adequate measures.
European Union
This product is in conformity with the protection requirements of EU Council Directive 2004/108/EC
on the approximation of the laws of the Member States relating to electromagnetic compatibility. APC
cannot accept responsibility for any failure to satisfy the protection requirements resulting from an
unapproved modification of the product.
This product has been tested and found to comply with the limits for Class A Information Technology
Equipment according to CISPR 22/European Standard EN 55022. The limits for Class A equipment
were derived for commercial and industrial environments to provide a reasonable protection against
interference with licensed communication equipment.
Attention: This is a Class A product. In a domestic environment this product may cause radio
interference in which case the user may be required to take adequate measures.
Korean 한국
A 급 기기 ( 업무용 방송통신기기 )
이 기기는 업무용 (A 급 ) 으로 전자파적합등록을 한 기기이오니판매자 또는 사용자는 이 점을 주의하
시기 바라며 , 가정외의지역에서 사용하는 것을 목적으로 합니다 .
APC Worldwide Customer Support
Customer support for this or any other APC product is available at no charge in any of the following ways:
• Visit the APC Web site to access documents in the APC Knowledge Base and to submit customer
support requests.
– www.apc.com (Corporate Headquarters)
Connect to localized APC Web sites for specific countries, each of which provides customer support
information.
– www.apc.com/support/
Global support searching APC Knowledge Base and using e-support.
• Contact the APC Customer Support Center by telephone or e-mail.
– Local, country-specific centers: go to www.apc.com/support/contact for contact information.
For information on how to obtain local customer support, contact the APC representative or other distributors
from whom you purchased your APC product.
© 2012 Schneider Electric. InfraStruxure, Smart-UPS, Symmetra, PowerNet, MGE, Galaxy, and
PowerChute are owned by Schneider Electric Industries S.A.S., American Power Conversion Corporation, or
their affiliated companies. All other trademarks are property of their respective owners.
990-3402D-001 3/2012